Browse by Tags

It’s that time of year and BlueHat v14 is almost upon us. As always, BlueHat is an opportunity for us to bring the brightest minds in security together, both internal and external, to discuss and tackle some of the hardest problems facing the industry today. Through this conference, our engineering...

CanSecWest , in beautiful Vancouver BC, is one of my favorite conferences each year. It’s a cozy little security con that brings together security researchers from all parts of the security ecosystem. Like a PhNeutral or a BlueHat , one never quite knows what to expect out of a CanSecWest, but...

Today on the MSRC blog, Matt Thomlinson, General Manager of Trustworthy Computing Security, announced our new philosophy on Coordinated Vulnerability Disclosure. I wanted to provide some context and history on how this came about. This post is about changing the way we at Microsoft talk about some familiar...

Handle: Cap'n Steve
IRL: Steve Adegbite
Rank: Senior Security Program Manager Lead
Likes: Reverse Engineering an obscene amount of code and ripping it up on a snowboard
Dislikes: Not much but if you hear me growl…run
Hi! It's been a while since I've had a chance to blog about all the things...

Sveika! Hey Steve here, been a while since I posted on the EcoStrat blog. With all the security events that happened during the latter half of 2008, I have been very focused on working with the security update releases and Microsoft Active Protections Program ( MAPP ).
Handle: Cap'n Steve
...

Handle: Cap'n Steve
IRL: Steve Adegbite
Rank: Senior Security Program Manager Lead
Likes: Reverse Engineering an obscene amount of code and ripping it up on a snowboard
Dislikes: Not much but if you hear me growl…run
Hey, Steve here. Just finally settling back in after traveling a bit...

This year marks the tenth BlueHat at Microsoft, and my sixth round in participating in the event that has been so instrumental in keeping Microsoft developers and executives in touch with the pulse of security research outside Microsoft, and serves as one of the key crossroads for the exchange of ideas...

I recently returned from the second iteration of the SOURCE Boston computer security conference, and I must say, it was both an intimate conference of less than 250 folks and a high-caliber gathering. As with other conferences that the Microsoft Security Response Center (MSRC) co-sponsors, we see these...

It has been nearly four months since we gathered in Redmond for BlueHat v12, and we’ve almost caught up on our sleep. As we prepare for what promises to be a momentous year for the BlueHat program – culminating in December with BlueHat v13 – we’ve selected nine of the most compelling...